To display the networks available to a virtual datacenter:
Privileges: Manage virtual network elements, Access external networks tab, Access public networks tab
API Features
Virtual datacenter networks are available in the Abiquo API. For example, see VirtualDatacentersResource and PrivateNetworksResource.
Screenshot: Private networks in private cloud
Screenshot: Private networks in public cloud (AWS)
In the Networks list, to view the pool and allocation of IPs:
You can then:
Private networks are only available within a virtual datacenter. However, your cloud provider may configure an external gateway for your virtual datacenter.
To create a private network:
Create private network
Create private network Amazon
For more details see GUI Create network Private
You can configure static routes when you create or edit a network. However, you should check with your systems administrator about when your VM will receive changes to static routes.
Field | Description | Example |
---|---|---|
Netmask | Destination network mask | 255.255.255.0 |
Network ID | Destination network or host | 1.1.1.0 |
Gateway IP | Next hop (on your network) | 10.10.10.100 |
To create new IP addresses in a private network do these steps.
Or you can add an IP directly to a VM. To do this:
To edit a private network
The new settings will apply to all VMs deployed after you save the network.
You can delete a private network if no VMs are using its IPs and it is not the default network for the virtual datacenter.
To delete a private network:
The platform automatically onboards external networks when you onboard virtual datacenters from vCloud Director.
Privileges: Manage virtual network elements, Access external networks tab, Manage external network elements
To display onboarded external networks
If an onboarded network has been deleted in the provider, its name will display in light gray text. If a VM is using an IP from this network, then you cannot deploy the VM.
If there are no VMs using the IPs of an external network that was already deleted in the provider, to delete the network in the platform, select it and click the delete button.
Each virtual datacenter requires a default network. If you deploy a VM without assigning a NIC, the platform will add one from the default network. You cannot unselect the default network, instead you must assign a new default network to replace it.
To set a network as the default, you will require privileges to access this network in the virtual infrastructure.
Privileges: Manage virtual datacenter network elements, Access public network tab, Manage public network elements, Access external network tab, Manage external network elements
To assign a network as the default for a virtual datacenter do these steps:
In public networks you can reserve or purchase public IP addresses for your VMs. Reserved IPs may be charged while they are reserved, even if they are not used in VMs.
Privilege: Manage public IPs, Access public networks tab, Manage public network elements
To add new public IP addresses to your virtual datacenter:
The platform will add the IPs to your VDC
You can also reserve public IPs directly from the Edit VM dialog.
During onboarding from public cloud, the platform will onboard existing public IP addresses in providers that support them, such as AWS and Azure. You can obtain them from the provider and assign them to your virtual datacenters and VMs.
The provider may charge for public IP addresses as soon as you reserve them for your virtual datacenter. Therefore you should reserve your IP addresses just before you deploy and check they are deleted when you undeploy your VMs. Remember that your provider may also limit the number of public IP addresses that you can use per virtual datacenter.
To add public IP addresses to your virtual datacenter, so that you can later assign them to your VMs:
Privileges: Manage virtual network elements, Manage floating IPs, Access public networks tab, Manage public network elements
Now when you edit a VM in the VDC and go to Network → Public, the platform will display the public IP address and you can add it to your VM.
To obtain a public IP directly for a VM, click Purchase public IPs.
To onboard any public IP addresses that were already created in your cloud provider, or update changes made directly in the provider:
Privileges: Manage virtual network elements, Manage floating IPs, Access public networks tab, Manage public network elements
You can release a public IP if it is not assigned to a VM.
In private cloud, to release a public IP that belongs to a public network, select the IP in the IP list and click the delete button.
In public cloud, click the link to Remove from VDC and then click the delete button.
You can use Quality of Service (QoS) traffic shaping parameters to limit the bandwidth for each public IP in a virtual datacenter.
This feature applies to public IPs in infrastructure and managed by NSX in vCenter and vCenter clusters.
Privileges: Manage public bandwidth limit
When you upgrade the platform or create a virtual datacenter, the public IPs bandwidth limit is disabled. To enable the limit for the public IPs of the VDC, edit the bandwidth limit.
To edit the bandwidth limit and enable it in the platform:
For more details see:
To register changes that were made outside the platform, save existing public IP bandwidth values. In the API, to register changes, send a POST request with the existing values.
The private IP reservation feature will prevent users from assigning reserved IPs to VMs within the platform. The platform does not display reserved IPs to allow users to select them for VMs. You can only assign reserved IPs to VMs from outside of Abiquo, for example, using a script. If you onboard a VM with a reserved IP, the platform logs a warning message.
Privilege: Manage private IP reservation
To reserve private IPs:
The platform will list the VMs in the virtual datacenter. Optionally select VMs to indicate where the IPs might be used. Note that you must check that the VMs are able to use these IPs. This selection does not assign the IPs to VMs.
The platform will display a padlock symbol and the reason beside the IP reserved addresses.
When the Network Address Translation (NAT) integration is available in your environment, to display NAT IPs and NAT rules:
To display NAT rules for a VM:
To manage or display NAT rules for a VM:
To enable VMs outside your VDC to connect to a VM with a private IP address, after you obtain a NAT IP, create a destination NAT rule, which is also called a DNAT rule.
To create a DNAT rule:
Enter the details of the DNAT rule
For more details see GUI Add NAT rule DNAT
To send outgoing traffic through a NAT IP that is not the default one, add an additional SNAT rule with these steps:
To create an SNAT rule:
Enter the addresses of the SNAT rule
For more details see GUI Add NAT rule SNAT
To use a NAT IP address as a public IP address for a load balancer:
The platform will automatically create a NAT rule to match the port mappings of the routing rule of the load balancer.
In addition to the NAT IP address assigned to the virtual datacenter, you can obtain NAT IP addresses for creating additional NAT rules.
To obtain an additional NAT IP address:
The platform will reserve an IP address and allocate it to your virtual datacenter.
You can then use the NAT IP address as the public IP address for a load balancer or to provide access to a private IP address.
You can use Quality of Service (QoS) traffic shaping parameters to limit the bandwidth for all the NSX NAT IPs in a virtual datacenter.
Privileges: Manage NAT bandwidth limit
When you create a virtual datacenter, the new "natbandwidthlimit" attribute is present but you must edit the virtual datacenter to enable it in the platform and in the NSX.
To edit the bandwidth limit and apply it in the NSX:
For more details see GUI Edit NAT bandwidth limit
To register changes that were made outside the platform, save existing NAT bandwidth values. In the API, to register changes, send a POST request with the existing values.
The platform provides a unified interface to firewalls in varied cloud environments.
This section describes firewall policies, which are similar to security groups. The platform supports firewall policies in private cloud with network managers (NSX, NSX-T) and in public cloud.
Abiquo firewall policies represent.
For more details, please see the public cloud features table for each provider.
In vCloud Director, the platform also supports classic firewalls, which are Edge firewalls at level of the public cloud region (orgVDC). See Manage classic firewalls.
You can display and manage firewalls in the platforms at the level of the virtual datacenter or the location (public cloud region or datacenter).
To display firewalls in a virtual datacenter in a provider:
To display all firewalls in Google Cloud Platform
To display all firewalls in a location (public cloud region or datacenter):
To filter firewalls, enter text in the Search box to search by the Name, Description, and Provider ID in the Firewalls list.
To display firewalls in an Azure Resource Group:
The synchronization process will onboard firewalls and it will update the platform's information about firewalls that already exist in the cloud provider. The platform synchronizes automatically when you onboard virtual resources from public cloud. Depending on the provider, the platform may support synchronization at the level of the location (public cloud region) or virtual datacenter.
To synchronize firewalls do these steps:
To synchronize a firewall in AWS before you add new firewall rules:
The platform can create firewall policies in virtual datacenters in the provider, or in the platform only, for later use in providers, depending on provider support.
Privilege: Manage firewall
To create a new firewall, do these steps:
If you entered a virtual datacenter, the platform created your firewall in the provider. The platform will display a Provider-ID and a Virtual datacenter ID for the firewall.
If you selected No virtual datacenter, the firewall will be created in the platform in the public cloud region for your enterprise. The synchronize process will not update this firewall. The platform will not create it in the provider until you select a virtual datacenter.
You can define firewall rules for inbound and outbound traffic in your firewall policy.
To add a new firewall rule:
Before you edit firewall rules in AWS, synchronize the firewall to update the rules because AWS will not allow you to create a rule that already exists in the security group. Remember that it may take some time for firewall rules to propagate throughout AWS. Until the rules have propagated, the platform will not be able to detect them. See http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/query-api-troubleshooting.html#eventual-consistency
Before you begin:
To move a firewall to another virtual datacenter
Q: Does my firewall exist in the provider? Which VDC does it belong to?
A: In the Abiquo API, the firewall object contains a link to the virtual datacenter it belongs to. In AWS or Azure ARM, if a firewall has a provider ID, then it exists in the cloud provider. The provider ID is the AWS security group ID or the Azure firewall name.
To delete a firewall policy:
The load balancer feature aims to simplify the creation of load balancers across all providers in the multi-cloud platform, providing a unified interface.
In AWS, Abiquo supports Application load balancers (see Manage Application Load Balancers) and Classic load balancers (described on this page).
Please refer to cloud provider documentation as the definitive guide to the load balancing features. And remember to check your cloud provider's pricing before you begin.
In vCloud Director, load balancers belong to a public cloud region, not a virtual datacenter. This means that in vCloud Director, you can attach VMs from more than one virtual datacenter to the same load balancer, and these load balancers do not work with private networks, which belong to only one virtual datacenter.
You can display and manage load balancers in the platform at the level of the virtual datacenter or the location (public cloud region or datacenter).
To display load balancers in virtual datacenters:
Select a virtual datacenter
Go to Network → Load balancers.
To display load balancers in a region, including those that do not exist in the provider.
To display load balancers in an Azure Resource Group:
Before you begin:
Privilege: Manage load balancers, Assign load balancers
To create a load balancer:
Click the + add button and complete the following dialogs according to your cloud provider's documentation
The following screenshots are from AWS or Azure
For more details see GUI Create load balancer General info
For more details see GUI Create load balancer Routing rules
For more details see GUI Add a new certificate
For more details see GUI Create load balancer Health check
For more details see GUI Create load balancer Firewalls
For more details see GUI Create load balancer Nodes
The cloud provider determines which elements of a load balancer that you can modify. Due to different provider support for load balancer features, it may be possible to make modifications in the platform that will later be rejected by the cloud provider, triggering an error. Check your cloud provider documentation for supported modifications.
The platform enables you to create site-to-site VPNs between virtual datacenters and other virtual datacenters or other entities.
This feature is available in datacenters using VMware with NSX-NAT or NSX-gateway.
To manage VPNs, go to Virtual datacenters → select a virtual datacenter → Network → VPN
Initial support for VPNs is per VDC, which means you need to create a separate VPN site for each connected virtual datacenter. Both sites of a VPN must have the same encryption and authentication settings, and inverse local and remote network configurations.
The following table describes VPN functionality in the providers.
AWS | VMware NSX | Azure | |
---|---|---|---|
Encryption | AES | AES, AES256, Triple DES, AES-GCM | AES128_SHA1, AES128_SHA256, AES256_SHA1, AES256_SHA256, _3DES_SHA1, _3DES_SHA256 |
Perfect forward secrecy enabled | always enabled | optional | always disabled |
DH group | DH2 | DH2, DH5, DH14 | DH2, DH14 |
Authentication | PSK (mandatory) | PSK (mandatory) | PSK (mandatory) |
To connect private cloud with public cloud, define the VPN site in private cloud first.
To create the VPN site for site1:
The platform will create the VPN site.
For more details see GUI Create a VPN
To create the VPN site for site2 in another VDC:
After you have created both VPN sites, on the VPNs tab, to check the connection in the network virtualization system, click the Check link in the VPN Status column, or when you edit a VPN site.